Computer security paper
Paper list
Paper list
265
Property Inference Attacks Against GANs
ML
GAN
Property inference attacks
266
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing
Covert channels
Air-gapped
mmWave
267
Subverting Stateful Firewalls with Protocol States
TCP/IP
268
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Federated Learning
Differential privacy
ML
269
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes
Android
Smartphone
Sandboxes
Malware
Sandbox-evasion techniques
270
Forensic Analysis of Configuration-based Attacks
271
The Taming of the Stack: Isolating Stack Data from Memory Errors
Stack data
Memory errors
272
HARPO: Learning to Subvert Online Behavioral Advertising
Behavioral advertising
Web
273
Get a Model! Model Hijacking Attack Against Machine Learning Models
Model hijacking attack
ML
274
SemperFi: Anti-spoofing GPS Receiver for UAVs
GPS
275
PoF: Proof-of-Following for Vehicle Platoons
Vehicle
Autonomous Vehicle
Platoon
V2V
276
Remote Memory-Deduplication Attacks
Memory deduplication
Remote memorydeduplication attacks
277
Interpretable Federated Transformer Log Learning for Cloud Threat Forensics
Threat detection
Forensics
ML
Federated learning
syslogs
278
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV)
Network
Network functions virtualization
NFV
279
Binary Search in Secure Computation
Binary search
Secure computation
ORAM
280
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates
User study
Compliance
281
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Fake news
Privacy
Messaging systems
282
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
TEE
Cache
Shared cache resources
CPU
Side-channel
283
hbACSS: How to Robustly Share Many Secrets
MPC
Crypto
Multi-party computation
284
Privacy in Urban Sensing with Instrumented Fleets, Using Air Pollution Monitoring As A Usecase
Privacy
Cyber-physical
Vehicle
285
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware
Smartphone
LTE
GSM
Cellular
Dynamic analysis
Android
Firmware
286
Transparency Dictionaries with Succinct Proofs of Correct Operation
287
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks
Cloud
Micro-architectural attacks
Schedulers
Co-Location attacks
288
V-Range: Enabling Secure Ranging in 5G Wireless Networks
5G
Location
Frequency offset attack
289
FedCRI: Federated Mobile Cyber-Risk Intelligence
ML
Federated learning
Android
iOS
Apps
CRI
290
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation
Network
Obfuscation
LFAs
SDN
291
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Federated Learning
NN
ML
Backdoor attacks
Targeted poisoning attacks
Poisoning attacks
292
EMS: History-Driven Mutation for Coverage-based Fuzzing
Fuzzing
Mutation-based fuzzing
293
CFInsight: A Comprehensive Metric for CFI Policies
CFI
294
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
Android
Smartphone
Java
Privacy
295
What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction
Adversarial examples
ML
DNN
AE detection
Autonomous Vehicle
296
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks
ML
DNN
Backdoor attacks
297
Chosen-Assembly Attack Against Commercial Code Virtualization Obfuscators
Code virtualization
Obfuscation
Deobfuscation
298
Preventing Kernel Hacks with HAKCs
Kernel
LKM
Linux
299
Building Embedded Systems Like It’s 1996
Embedded devices
Embedded Systems
Measurement
IoT
300
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing
VPN
DoS
WireGuard
OpenVPN
AnyConnect VPN
strongSwan
301
D-Box: DMA-enabled compartmentalization for embedded applications
302
ditto: WAN Traffic Obfuscation at Line Rate
303
Tetrad: Actively Secure 4PC for Secure Training and Inference
304
Cross-Language Attacks
305
FakeGuard: Exploring haptic response to mitigate the vulnerability in commercial fingerprint anti-spoofing
306
On Utility and Privacy in Synthetic Genomic Data
307
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting
308
PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android
309
Euler: Detecting Network Lateral Movement via Scalable Temporal Graph Link Prediction
310
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems
Autonomous Vehicle
Object detection
Traffic sign recognition
Camera
311
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments
312
Clarion: Anonymous Communication from Multiparty Shuffling Protocols
313
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications
314
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
315
An In-depth Analysis of Duplicated Linux Kernel Bug Reports
316
A Metadata-Hiding File-Sharing System with Malicious Security
317
To Trust or Not to Trust: Hybrid Multi-party Computation with Trusted Execution Environment
318
Systematic Discovery of Denial-of-Service Vulnerability in Autonomous Driving Planning under Physical-World Attacks
Autonomous Vehicle
Planning
Apollo
LGSVL
319
RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit
320
Shaduf: Non-Cycle Payment Channel Rebalancing
321
A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
322
Packet-Level Open-World App Fingerprinting on Wireless Traffic
323
ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment
324
SynthCT: Towards Portable Constant-Time Code
325
KASPER: Scanning for Generalized Transient Execution Gadgets in the Linux
326
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale
327
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure
328
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning
329
GhostTalk: Interactive Attack on Smartphone Voice Assistant Through Power Line Side-Channel
330
Let’s Authenticate: Automated Certificates for User Authentication
331
Demystifying Local Business Search Poisoning for Illicit Drug Promotion
332
VPNInspector: Systematic Investigation of the VPN Ecosystem
VPN
333
Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection
334
Hiding My Real Self! Protecting 3D Printer Intellectual Property Against Optical Side-Channel Attacks
335
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites
336
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing
337
LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference
338
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity
339
Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators
340
FANDEMIC: Firmware Attack Construction and Deployment on Power Management IC and Impacts on IoT Applications
341
COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation
342
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
343
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux
344
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP
345
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities
346
Speeding Dumbo: Pushing Asynchronous BFT to Practice
347
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems